Author

Topic: vanity addresses question (Read 485 times)

full member
Activity: 176
Merit: 100
April 28, 2013, 07:15:05 AM
#13
There are two major topics on this in the technical and development forum if you want to read more about including information on the vanity pool.
newbie
Activity: 17
Merit: 0
April 28, 2013, 07:14:05 AM
#12
i saw somewhere else in the forum a post about mining pool for vanity addresses. is this done just by brute force until you hit a combination of letters that you want? if somebody mines a vanity address for you then won't they know the private key and the security will be compromised?
Yes, it just brute forces it, I waited a night for mine vanity address (see signature). Smiley
sr. member
Activity: 249
Merit: 250
April 28, 2013, 07:09:24 AM
#11
any links to the fancy maths? i don't get how a miner can give you the ability to generate a private key if he doesn't have the ability to do it himself and might already have done it.

It's actually pretty cool.

From StackExchange:

Quote
Bitcoin addresses are created from ECDSA keypairs. Their property is that if you take two private keys and add them together (with appropriate modulo operations), the sum will map to a public key that is the same one as one would obtain by adding the two public keys corresponding to the private keys.

This means that in order to outsource vanity key generation, one can create an ECDSA keypair, store the private key safely, and give out the public key to other people. They would then proceed to generate ECDSA keypairs, summing the generated public keys to the one provided by you, and checking whether they map to the appropriate vanity address. If it does, they need only to give you the appropriate private key, which you then need to add to your secret private key in order to obtain the private key that maps itself to the vanity address.

man i did two semesters of cryptography and it still trips me out sometimes :S
newbie
Activity: 43
Merit: 0
April 28, 2013, 06:59:10 AM
#10
any links to the fancy maths? i don't get how a miner can give you the ability to generate a private key if he doesn't have the ability to do it himself and might already have done it.

It's actually pretty cool.

From StackExchange:

Quote
Bitcoin addresses are created from ECDSA keypairs. Their property is that if you take two private keys and add them together (with appropriate modulo operations), the sum will map to a public key that is the same one as one would obtain by adding the two public keys corresponding to the private keys.

This means that in order to outsource vanity key generation, one can create an ECDSA keypair, store the private key safely, and give out the public key to other people. They would then proceed to generate ECDSA keypairs, summing the generated public keys to the one provided by you, and checking whether they map to the appropriate vanity address. If it does, they need only to give you the appropriate private key, which you then need to add to your secret private key in order to obtain the private key that maps itself to the vanity address.

that is pretty cool
member
Activity: 70
Merit: 10
Move over clarinets, I'm getting on the band wagon
April 28, 2013, 06:39:19 AM
#9
I haven't seen a "vanity" address. What would an example of that look like?

Look at mine for instance Smiley

I see. Thanks for pointing that out. Somewhat cool.

Kind of like when the first three letters of your randomly generated license plate number turns out to be your initials.
member
Activity: 70
Merit: 10
Move over clarinets, I'm getting on the band wagon
April 28, 2013, 06:37:29 AM
#8
i think yours might be something like Pzi4nknewbie8s878d578hwehj7hj76kxg6g

Gotcha. I was envisioning the whole string being customized. Thanks.
newbie
Activity: 17
Merit: 0
April 28, 2013, 06:16:30 AM
#7
any links to the fancy maths? i don't get how a miner can give you the ability to generate a private key if he doesn't have the ability to do it himself and might already have done it.

It's actually pretty cool.

From StackExchange:

Quote
Bitcoin addresses are created from ECDSA keypairs. Their property is that if you take two private keys and add them together (with appropriate modulo operations), the sum will map to a public key that is the same one as one would obtain by adding the two public keys corresponding to the private keys.

This means that in order to outsource vanity key generation, one can create an ECDSA keypair, store the private key safely, and give out the public key to other people. They would then proceed to generate ECDSA keypairs, summing the generated public keys to the one provided by you, and checking whether they map to the appropriate vanity address. If it does, they need only to give you the appropriate private key, which you then need to add to your secret private key in order to obtain the private key that maps itself to the vanity address.
member
Activity: 107
Merit: 10
April 28, 2013, 06:12:54 AM
#6
I haven't seen a "vanity" address. What would an example of that look like?

Look at mine for instance Smiley
newbie
Activity: 43
Merit: 0
April 28, 2013, 06:12:44 AM
#5
i think yours might be something like Pzi4nknewbie8s878d578hwehj7hj76kxg6g
member
Activity: 70
Merit: 10
Move over clarinets, I'm getting on the band wagon
April 28, 2013, 06:07:12 AM
#4
I haven't seen a "vanity" address. What would an example of that look like?
newbie
Activity: 43
Merit: 0
April 28, 2013, 06:03:03 AM
#3
any links to the fancy maths? i don't get how a miner can give you the ability to generate a private key if he doesn't have the ability to do it himself and might already have done it.
newbie
Activity: 17
Merit: 0
April 28, 2013, 05:57:14 AM
#2
There's some fancy math involved, but the miner who finds your vanity address doesn't get the private key.
newbie
Activity: 43
Merit: 0
April 28, 2013, 05:55:50 AM
#1
i saw somewhere else in the forum a post about mining pool for vanity addresses. is this done just by brute force until you hit a combination of letters that you want? if somebody mines a vanity address for you then won't they know the private key and the security will be compromised?
Jump to: